GIAC Certified Windows Security Administrator (GCWN) Expert - Led Video Course



Visit this Web URL :

https://masterytrail.com/product/legitimized-giac-certified-windows-security-administrator-gcwn-expert-led-video-course-masterytrail



Lesson 1: Introduction to Windows Security

1.1 Overview of Windows Security

1.2 Windows Security Architecture

1.3 Key Terminology

1.4 Evolution of Windows Security

1.5 Security Goals and Principles

1.6 Common Attack Vectors

1.7 Security Features in Windows

1.8 Windows Security Products

1.9 Security Compliance Standards

1.10 Security Roles and Responsibilities


Lesson 2: Windows Authentication Mechanisms

2.1 Authentication Concepts

2.2 Local vs Domain Authentication

2.3 NTLM Authentication

2.4 Kerberos Protocol

2.5 Credential Storage

2.6 Smart Card Authentication

2.7 Multi-factor Authentication

2.8 Credential Guard

2.9 Cached Credentials

2.10 Authentication Troubleshooting


Lesson 3: Active Directory Security

3.1 Introduction to Active Directory

3.2 Domain Controllers

3.3 Active Directory Objects

3.4 AD Security Best Practices

3.5 Privileged Accounts

3.6 Group Policy Security

3.7 Delegation of Control

3.8 Forest and Domain Trusts

3.9 Auditing AD Changes

3.10 Securing AD Replication


Lesson 4: Windows Authorization and Access Control

4.1 Authorization Concepts

4.2 Access Control Models

4.3 Discretionary Access Control (DAC)

4.4 System Access Control Lists (SACLs)

4.5 Effective Permissions

4.6 User Rights Assignment

4.7 Permission Inheritance

4.8 Managing File System Permissions

4.9 Auditing Access Control

4.10 Troubleshooting Access Issues


Lesson 5: Group Policy Security

5.1 Introduction to Group Policy

5.2 Group Policy Objects (GPOs)

5.3 GPO Processing Order

5.4 Security Templates

5.5 User Rights Assignment via GPO

5.6 Software Restriction Policies

5.7 AppLocker Policies

5.8 Auditing via Group Policy

5.9 GPO Security Filtering

5.10 Best Practices for GPOs


Lesson 6: Windows Firewall and Network Security

6.1 Windows Firewall Overview

6.2 Firewall Profiles

6.3 Inbound and Outbound Rules

6.4 Configuring Firewall via GPO

6.5 Advanced Firewall Settings

6.6 Monitoring Firewall Activity

6.7 Troubleshooting Firewall Issues

6.8 Network Isolation

6.9 IPSec Integration

6.10 Network Security Best Practices


Lesson 7: Patch Management and Updates

7.1 Patch Management Overview

7.2 Windows Update Service

7.3 WSUS Configuration

7.4 Update Deployment Options

7.5 Patch Testing Procedures

7.6 Patch Compliance Reporting

7.7 Rollback Procedures

7.8 Automating Patch Management

7.9 Third-party Patch Management

7.10 Patch Management Best Practices


Lesson 8: Securing Windows Services

8.1 Windows Services Overview

8.2 Service Account Types

8.3 Restricting Service Permissions

8.4 Hardening Critical Services

8.5 Managing Service Dependencies

8.6 Service Auditing

8.7 Disabling Unnecessary Services

8.8 Service Recovery Options

8.9 Monitoring Service Activity

8.10 Securing Network Services


Lesson 9: Hardening Windows Operating Systems

9.1 Hardening Principles

9.2 Default Settings Analysis

9.3 Disabling Unnecessary Features

9.4 Security Baselines

9.5 Local Security Policies

9.6 Registry Hardening

9.7 User Account Control (UAC)

9.8 Secure System Configuration

9.9 Hardening Remote Access

9.10 Verifying Hardening Measures


Lesson 10: Windows Event Logging and Monitoring

10.1 Windows Event Log Architecture

10.2 Types of Event Logs

10.3 Configuring Event Log Settings

10.4 Event Log Forwarding

10.5 Event Log Analysis

10.6 Monitoring Security Events

10.7 Custom Event Views

10.8 Log Retention Policies

10.9 Integrating with SIEM

10.10 Event Log Best Practices


Lesson 11: Windows Defender and Malware Protection

11.1 Introduction to Windows Defender

11.2 Real-time Protection

11.3 Defender Configuration

11.4 Scheduled Scans

11.5 Quarantine and Remediation

11.6 Threat Intelligence Integration

11.7 Defender ATP

11.8 Malware Analysis Tools

11.9 Responding to Malware Alerts

11.10 Best Practices for Anti-malware


Lesson 12: Securing Remote Desktop Services

12.1 RDP Security Overview

12.2 Network Level Authentication

12.3 RDP Encryption Settings

12.4 Restricting RDP Access

12.5 Remote Desktop Gateway

12.6 RDP Logging and Auditing

12.7 Two-factor Authentication for RDP

12.8 RDP Session Timeouts

12.9 RDP Vulnerability Mitigation

12.10 Best Practices for Remote Access


Lesson 13: Windows Credential Management

13.1 Credential Storage Locations

13.2 SAM and LSASS

13.3 Credential Manager

13.4 Managing Cached Credentials

13.5 Protecting Passwords

13.6 Credential Theft Techniques

13.7 Mitigating Credential Theft

13.8 Credential Guard Deployment

13.9 Secure Password Policies

13.10 Credential Cleanup Procedures


Lesson 14: BitLocker and Disk Encryption

14.1 Introduction to BitLocker

14.2 Encryption Algorithms

14.3 TPM Integration

14.4 BitLocker Configuration

14.5 Managing BitLocker Keys

14.6 Network Unlock

14.7 BitLocker Recovery

14.8 Monitoring BitLocker Status

14.9 BitLocker to Go

14.10 Best Practices for Encryption


Lesson 15: User Account Security

15.1 Types of Windows Accounts

15.2 Account Provisioning

15.3 Secure Account Policies

15.4 Account Lockout Policies

15.5 Privileged Account Management

15.6 Managing Local Accounts

15.7 Disabling Inactive Accounts

15.8 Auditing Account Activity

15.9 Account Expiry Policies

15.10 User Account Security Best Practices


Lesson 16: Securing Windows Applications

16.1 Application Security Overview

16.2 Application Whitelisting

16.3 AppLocker Implementation

16.4 Software Restriction Policies

16.5 Securing Legacy Applications

16.6 Auditing Application Activity

16.7 Managing Application Updates

16.8 Application Sandboxing

16.9 Preventing Application Exploits

16.10 Best Practices for Application Security


Lesson 17: Windows Update Security

17.1 Windows Update Overview

17.2 Update Channels

17.3 Security Updates vs Feature Updates

17.4 Automatic Updates Configuration

17.5 Managing Update Rollouts

17.6 Update Verification

17.7 Update Failure Troubleshooting

17.8 Update Logging

17.9 WSUS Security

17.10 Best Practices for Update Management


Lesson 18: Network Access Protection (NAP)

18.1 NAP Overview

18.2 NAP Components

18.3 NAP Enforcement Methods

18.4 Configuring NAP Policies

18.5 Health Validators

18.6 Remediation Servers

18.7 NAP Reporting

18.8 Integrating NAP with DHCP

18.9 Troubleshooting NAP

18.10 NAP Best Practices


Lesson 19: Securing Windows File Systems

19.1 File System Types

19.2 NTFS Permissions

19.3 EFS (Encrypting File System)

19.4 Auditing File Access

19.5 Managing Shares

19.6 Securing Network Shares

19.7 File System Quotas

19.8 Preventing Data Leakage

19.9 Removable Media Security

19.10 File System Security Best Practices


Lesson 20: Windows PKI and Certificate Management

20.1 Introduction to PKI

20.2 Certificate Authorities

20.3 Certificate Enrollment

20.4 Certificate Templates

20.5 Managing Certificates

20.6 Certificate Revocation

20.7 Auto-enrollment

20.8 Certificate Store Locations

20.9 Troubleshooting Certificates

20.10 Best Practices for PKI


Lesson 21: Windows Security Auditing

21.1 Auditing Overview

21.2 Audit Policy Configuration

21.3 Object Access Auditing

21.4 Logon/Logoff Auditing

21.5 Policy Change Auditing

21.6 Privilege Use Auditing

21.7 Process Tracking

21.8 Directory Service Auditing

21.9 Audit Log Management

21.10 Auditing Best Practices


Lesson 22: Securing Windows PowerShell

22.1 PowerShell Security Features

22.2 Execution Policies

22.3 Script Signing

22.4 Constrained Language Mode

22.5 Just Enough Administration

22.6 PowerShell Remoting Security

22.7 Auditing PowerShell Usage

22.8 PowerShell Logging

22.9 PowerShell Threats

22.10 Securing PowerShell Scripts


Lesson 23: Windows Security Tools and Utilities

23.1 Security Configuration Wizard

23.2 Windows Security Center

23.3 Sysinternals Tools

23.4 Microsoft Baseline Security Analyzer

23.5 Local Security Policy Tool

23.6 Event Viewer

23.7 Resource Monitor

23.8 Task Manager Security Features

23.9 Windows Admin Center

23.10 Using Security Tools in Practice


Lesson 24: Windows Security Policy Management

24.1 Security Policy Overview

24.2 Local Security Policy vs Group Policy

24.3 Account Policies

24.4 Audit Policies

24.5 User Rights Assignment

24.6 Security Options

24.7 Importing/Exporting Policies

24.8 Policy Conflict Resolution

24.9 Monitoring Policy Changes

24.10 Policy Management Best Practices


Lesson 25: Windows Security Baseline Implementation

25.1 Baseline Concept

25.2 Microsoft Security Baselines

25.3 Baseline Customization

25.4 Deploying Baselines

25.5 Baseline Assessment Tools

25.6 Baseline Compliance Checks

25.7 Remediation Strategies

25.8 Reporting on Baselines

25.9 Updating Baselines

25.10 Continuous Improvement


Lesson 26: Securing Domain Controllers

26.1 Domain Controller Roles

26.2 Physical Security

26.3 DC Hardening Steps

26.4 Securing AD Replication

26.5 Restricting DC Access

26.6 Monitoring DCs

26.7 Backing up Domain Controllers

26.8 Protecting DC Credentials

26.9 DC Patch Management

26.10 Incident Response for DCs


Lesson 27: Incident Response on Windows Systems

27.1 Incident Response Overview

27.2 Identifying Security Events

27.3 Collecting Forensic Evidence

27.4 Analyzing Security Logs

27.5 Isolating Affected Systems

27.6 Remediation Procedures

27.7 Reporting Incidents

27.8 Post-Incident Review

27.9 Communication Plans

27.10 Improving Response Capabilities


Lesson 28: Windows Security Compliance

28.1 Compliance Standards (PCI, HIPAA, etc.)

28.2 Windows Compliance Tools

28.3 Compliance Auditing

28.4 Automating Compliance Checks

28.5 Reporting Compliance

28.6 Remediation for Non-Compliance

28.7 Documentation Requirements

28.8 Compliance Policy Development

28.9 Continuous Compliance

28.10 Compliance Best Practices


Lesson 29: Windows Security Automation

29.1 Automation Tools Overview

29.2 PowerShell Automation

29.3 Task Scheduler Security

29.4 Automating Patch Deployment

29.5 Automated Auditing

29.6 Automated Backup and Recovery

29.7 Security Automation Best Practices

29.8 Scripting Common Security Tasks

29.9 Automation for Compliance

29.10 Monitoring Automated Processes


Lesson 30: Windows Security in Virtual Environments

30.1 Virtualization Security Overview

30.2 Hyper-V Security Features

30.3 Securing Virtual Machines

30.4 Isolation Techniques

30.5 Virtual Networking Security

30.6 Managing VM Snapshots

30.7 Securing VM Storage

30.8 VM Patch Management

30.9 Monitoring Virtual Environments

30.10 Incident Response in Virtualization


Lesson 31: Windows Security for Cloud Integration

31.1 Cloud Security Overview

31.2 Hybrid Identity

31.3 Azure AD Integration

31.4 Securing Cloud Resources

31.5 Cloud-based Authentication

31.6 Managing Cloud Permissions

31.7 Cloud Logging and Auditing

31.8 Data Protection in the Cloud

31.9 Cloud Compliance

31.10 Best Practices for Cloud Security


Lesson 32: Windows Security Threats and Vulnerabilities

32.1 Common Threats to Windows

32.2 Vulnerability Assessment Tools

32.3 Zero-Day Vulnerabilities

32.4 Privilege Escalation

32.5 Lateral Movement

32.6 Pass-the-Hash Attacks

32.7 Ransomware Threats

32.8 Social Engineering

32.9 Insider Threats

32.10 Mitigation Strategies


Lesson 33: Windows Security Updates and Hotfixes

33.1 Hotfixes vs Updates

33.2 Cumulative Updates

33.3 Servicing Channels

33.4 Update Catalog

33.5 Hotfix Installation

33.6 Update Rollback

33.7 Verifying Update Status

33.8 Update Troubleshooting

33.9 Security Advisory Monitoring

33.10 Update Documentation


Lesson 34: Securing Windows DNS Services

34.1 DNS Security Basics

34.2 Secure Dynamic Updates

34.3 DNSSEC

34.4 DNS Logging and Auditing

34.5 DNS Cache Poisoning Prevention

34.6 Role-based Access for DNS

34.7 Monitoring DNS Traffic

34.8 DNS Service Hardening

34.9 DNS Response Policy Zones

34.10 DNS Security Best Practices


Lesson 35: Windows Security for Mobile Devices

35.1 Mobile Device Management Overview

35.2 Windows Defender for Endpoint

35.3 Mobile Application Security

35.4 Device Encryption

35.5 Secure Access Controls

35.6 Network Security for Mobile

35.7 Mobile Patch Management

35.8 Monitoring Mobile Devices

35.9 Data Loss Prevention

35.10 Mobile Security Policies


Lesson 36: Windows Security and Data Loss Prevention

36.1 DLP Concepts

36.2 DLP Tools for Windows

36.3 File Classification Infrastructure

36.4 Protecting Sensitive Data

36.5 DLP Policies and Enforcement

36.6 Monitoring Data Movement

36.7 Preventing Data Exfiltration

36.8 DLP Incident Response

36.9 DLP Reporting

36.10 Best Practices for DLP


Lesson 37: Securing Windows Web Servers (IIS)

37.1 IIS Security Overview

37.2 Hardening IIS

37.3 Managing IIS Permissions

37.4 SSL/TLS for IIS

37.5 Application Pool Security

37.6 Web Application Firewall

37.7 Logging and Monitoring

37.8 IIS Authentication Methods

37.9 Patch Management for IIS

37.10 Incident Response for IIS


Lesson 38: Securing Windows Print Services

38.1 Print Services Overview

38.2 Print Server Hardening

38.3 Printer Permissions

38.4 Print Spooler Security

38.5 Auditing Print Jobs

38.6 Printer Driver Security

38.7 Network Print Security

38.8 Print Service Monitoring

38.9 Patch Management for Print Services

38.10 Print Service Incident Response


Lesson 39: Securing Windows Remote Access Services

39.1 Remote Access Overview

39.2 VPN Configuration

39.3 RADIUS Integration

39.4 Secure Authentication for Remote Access

39.5 Remote Access Policies

39.6 Auditing Remote Access

39.7 Securing RAS Servers

39.8 Remote Access Logging

39.9 Patch Management for Remote Access

39.10 Best Practices for Remote Access


Lesson 40: Windows Security for Endpoints

40.1 Endpoint Security Overview

40.2 Endpoint Protection Tools

40.3 Device Control

40.4 Application Control

40.5 Endpoint Patch Management

40.6 Monitoring Endpoint Activity

40.7 Incident Response for Endpoints

40.8 User Awareness Training

40.9 Endpoint Encryption

40.10 Endpoint Security Best Practices


Lesson 41: Advanced Auditing and Forensics

41.1 Advanced Audit Policy Configuration

41.2 Collecting Forensic Data

41.3 Timeline Analysis

41.4 File and Process Analysis

41.5 Registry Forensics

41.6 Memory Forensics

41.7 Network Forensics

41.8 Reporting Forensic Findings

41.9 Legal Considerations

41.10 Tools for Windows Forensics


Lesson 42: Windows Security for Servers

42.1 Server Hardening

42.2 Securing Server Roles

42.3 Server Patch Management

42.4 Server Monitoring

42.5 Server Authentication and Authorization

42.6 Remote Administration Security

42.7 Backup and Recovery

42.8 Server Incident Response

42.9 Compliance for Servers

42.10 Server Security Best Practices


Lesson 43: Securing Windows Workstations

43.1 Workstation Security Overview

43.2 Hardening Workstation Configurations

43.3 Enforcing Security Policies

43.4 Application Security on Workstations

43.5 Patch Management for Workstations

43.6 Monitoring Workstation Activity

43.7 User Training and Awareness

43.8 Remote Workstation Security

43.9 Incident Response for Workstations

43.10 Workstation Security Best Practices


Lesson 44: Windows Security for BYOD (Bring Your Own Device)

44.1 BYOD Challenges

44.2 Endpoint Security for BYOD

44.3 Device Registration

44.4 Mobile Application Management

44.5 Data Protection Strategies

44.6 Network Access Control

44.7 Monitoring BYOD Activity

44.8 Policy Enforcement

44.9 Incident Response for BYOD

44.10 BYOD Security Best Practices


Lesson 45: Windows Security in DevOps Environments

45.1 DevOps Security Concepts

45.2 Securing Build Pipelines

45.3 Managing Secrets

45.4 Code Signing

45.5 Automated Testing for Security

45.6 Monitoring DevOps Activities

45.7 Patch Management in DevOps

45.8 Secure Deployment Practices

45.9 Compliance in DevOps

45.10 DevOps Security Best Practices


Lesson 46: Windows Security for IoT Devices

46.1 IoT Security Challenges

46.2 Device Discovery

46.3 Secure Device Configuration

46.4 Network Segmentation

46.5 Firmware Updates

46.6 Monitoring IoT Devices

46.7 Data Protection for IoT

46.8 Incident Response for IoT

46.9 Compliance for IoT

46.10 IoT Security Best Practices


Lesson 47: Windows Security Logging and SIEM Integration

47.1 Logging Standards

47.2 Log Management Tools

47.3 SIEM Overview

47.4 SIEM Integration with Windows

47.5 Log Forwarding

47.6 Correlating Security Events

47.7 Incident Detection with SIEM

47.8 SIEM Reporting

47.9 Tuning SIEM Rules

47.10 SIEM Best Practices


Lesson 48: Windows Security for Email Services

48.1 Email Security Overview

48.2 Securing Exchange Server

48.3 Email Authentication Methods

48.4 Spam and Malware Filtering

48.5 Email Encryption

48.6 Auditing Email Activity

48.7 Patch Management for Email Servers

48.8 Incident Response for Email

48.9 User Training for Email Security

48.10 Email Security Best Practices


Lesson 49: Windows Security for Database Servers

49.1 Database Server Security Overview

49.2 SQL Server Authentication

49.3 Securing Database Connections

49.4 Data Encryption at Rest

49.5 Database Auditing

49.6 Managing Database Permissions

49.7 Patch Management for Databases

49.8 Backup and Recovery Security

49.9 Monitoring Database Activity

49.10 Incident Response for Databases


Lesson 50: Windows Security Best Practices and Review

50.1 Reviewing Key Security Concepts

50.2 Building a Security Framework

50.3 Continuous Improvement

50.4 Security Awareness Training

50.5 Policy and Procedure Development

50.6 Incident Response Planning

50.7 Monitoring and Auditing

50.8 Regular Security Assessments

50.9 Staying Up-to-date

50.10 Preparing for the GCWN ExamÂ